Sciweavers

2027 search results - page 142 / 406
» When is it best to best-respond
Sort
View
CLEF
2010
Springer
15 years 2 months ago
Multimedia Search with Noisy Modalities: Fusion and Multistage Retrieval
Abstract. We report our experiences from participating to the controlled experiment of the ImageCLEF 2010 Wikipedia Retrieval task. We built an experimental search engine which com...
Avi Arampatzis, Savvas A. Chatzichristofis, Konsta...
EUROPAR
2010
Springer
15 years 2 months ago
Transactional Mutex Locks
Mutual exclusion locks limit concurrency but offer low latency. Software transactional memory (STM) typically has higher latency, but scales well. In this paper we propose transac...
Luke Dalessandro, David Dice, Michael L. Scott, Ni...
GECON
2010
Springer
198views Business» more  GECON 2010»
15 years 2 months ago
Resource-Level QoS Metric for CPU-Based Guarantees in Cloud Providers
Success of Cloud computing requires that both customers and providers can be confident that signed Service Level Agreements (SLA) are supporting their respective business activitie...
Iñigo Goiri, Ferran Julià, Josep Ori...
GECCO
2008
Springer
324views Optimization» more  GECCO 2008»
15 years 2 months ago
Convergence behavior of the fully informed particle swarm optimization algorithm
The fully informed particle swarm optimization algorithm (FIPS) is very sensitive to changes in the population topology. The velocity update rule used in FIPS considers all the ne...
Marco Antonio Montes de Oca, Thomas Stützle
CRYPTO
2010
Springer
145views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
Protocols for Multiparty Coin Toss with Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution. These protocols are used as a building block in many cryptographic protocols. Cleve [STOC...
Amos Beimel, Eran Omri, Ilan Orlov